Search Results for: compliance policies Blog Post Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own... Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,... Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We... Blog Post Hackbits Episode 4: Cybersecurity and NY Department of Financial Services September 10, 2021 Hackbits host Gaspare Marturano interviews SMLR Group, Inc. CEO Alan Heyman. Mr. Heyman is a recognized expert in many phases... Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or... Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In... Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to... Blog Post What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only... Blog Post Best practices for protecting medical devices against ransomware attacks June 15, 2021 In this day and age, no government, business, or organization is safe from ransomware, not even our frontliners in the... Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,... Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge.... Blog Post Ransomware Gangs Recruiting Affiliates Now by Creating Websites July 7, 2021 Ransomware gangs have begun to promote their services by other methods after two notable Russian-speaking forums prohibited ransomware-related topics. One... Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and... Blog Post OFAC Guidance for Ransomware Payments. LIFARS Q and A Session with David Tannenbaum October 13, 2020 OFAC: Ransomware Payments May Violate Sanctions Laws The Office of Foreign Assets Control (OFAC) issued an advisory to companies, DFIR... Blog Post Security Maturity Models Part 2: What is PRISMA? November 23, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to...
Blog Post Giving Diligence its Due: Timeless Strategies for Surviving Change Webinar July 29, 2020 Legal and Cyber Strategy Webinar. Due diligence has always been a best practice in vetting vendors and managing your own...
Blog Post Importance Of Log Policy And Log Retention: What To Log And How Long You Should Keep It? February 12, 2021 Enterprise systems and software generate a plethora of log entries every day for your security team to handle. For instance,...
Blog Post The Secure Access Service Edge (SASE) Security Model July 2, 2021 As we shift further towards remote working environments, it’s becoming clear that we’ve passed the point of no return. We...
Blog Post Hackbits Episode 4: Cybersecurity and NY Department of Financial Services September 10, 2021 Hackbits host Gaspare Marturano interviews SMLR Group, Inc. CEO Alan Heyman. Mr. Heyman is a recognized expert in many phases...
Blog Post Researchers Aim to Trace PII Data Sharing Through 300 Fake Accounts October 6, 2021 Due to a number of high-profile incidents, the way in which big companies and data brokers use (or, abuse) or...
Blog Post Is IASME a viable alternative to ISO 27001 certification? July 15, 2021 ISO/IEC 27001 is considered by many to be the de facto international standard on how to manage information security. In...
Blog Post University Breach: Wi-Fi Networks Log-In Credentials, Thousands are Exposed October 28, 2021 Multiple certificate misconfiguration flaws in a free Wi-Fi network used by students and faculty from various universities can lead to...
Blog Post What To Look For When Selecting a DLP Solution For Your Business? June 1, 2021 According to IBM, the average data breach cost organization’s an average of $3.86 million per incident. However, organizations are only...
Blog Post Best practices for protecting medical devices against ransomware attacks June 15, 2021 In this day and age, no government, business, or organization is safe from ransomware, not even our frontliners in the...
Blog Post How to Protect Backups Against Ransomware March 23, 2021 It’s estimated that damages as a result of ransomware will reach $20 billion by 2021. Effective and risk-aware backup strategies,...
Blog Post Shadow IT: The Risks, How it Gets Exploited, Its Mitigation Steps January 7, 2021 Shadow IT refers to the use of IT applications, software, and hardware without the corporate IT department’s approval and knowledge....
Blog Post Ransomware Gangs Recruiting Affiliates Now by Creating Websites July 7, 2021 Ransomware gangs have begun to promote their services by other methods after two notable Russian-speaking forums prohibited ransomware-related topics. One...
Blog Post Root CA Security Best Practices for Ensuring Trusted and Compliant Interactions April 19, 2021 Your certification authority (CA) is a key component in securing your network. It is the entity that issues, manages, and...
Blog Post OFAC Guidance for Ransomware Payments. LIFARS Q and A Session with David Tannenbaum October 13, 2020 OFAC: Ransomware Payments May Violate Sanctions Laws The Office of Foreign Assets Control (OFAC) issued an advisory to companies, DFIR...
Blog Post Security Maturity Models Part 2: What is PRISMA? November 23, 2020 Threat environment in our ever-expanding cyberspace is dynamic. Organizations cannot implement security measures at once and let them continue to...